Information Systems Security Practices in Social Software Applications: A Systematic Literature Review

Norman, A.A. and Tamrin, S.I. and Hamid, S. (2016) Information Systems Security Practices in Social Software Applications: A Systematic Literature Review. Aslib Journal of Information Management. pp. 1-35. ISSN 2050-3806, DOI https://doi.org/10.1108/AJIM-08-2016-0124. (Submitted)

[img]
Preview
PDF (Full text)
PDF_Proof.PDF - Accepted Version

Download (1MB)

Abstract

The paper aims to investigate the current Information Systems Security (ISS) practices of the Social Software Application (SSA) users via the Internet. Design/methodology/approach – The paper opted for a systematic literature review (SLR) survey on ISS and its practices in SSAs between 2010 and 2015. The studiy includes a set of 39 papers from among 1,990 retrieved papers published in thirty-three high impact journals. The selected papers were filtered using the Publish or Perish (PoP) software by Harzing and Journal Citation Index (JCR) with an inclusion criterion of least 1 citation per article. Findings – The practice of ISS is driven by the need to protect the confidentiality, integrity, and availability of the data from being tampered. It is coherent with the current practice as reported by many researchers in this study. Four important factors lead to the ISS practice in SSA: protection tools offered, ownership, user behavior and security policy. Practical implications – The paper highlights the implication of successful ISS practices is having clear security purpose and security supported environment (user behavior and security protection tools) and governance (security policy and ownership) protection tools offered, ownership, user behavior and security policy towards ISS practice by the users. Originality/value – This paper fulfills an identified need to study how to enable ISS practice.

Item Type: Article
Funders: UNSPECIFIED
Additional Information: Article Journal - MST
Uncontrolled Keywords: Information systems security practices; Social software applications; Systematic literature review; Confidentiality; integrity; Availability
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Faculty of Computer Science & Information Technology
Depositing User: Mr. Mohd Safri
Date Deposited: 01 Mar 2017 08:55
Last Modified: 01 Mar 2017 08:55
URI: http://eprints.um.edu.my/id/eprint/17096

Actions (login required)

View Item View Item